Search

Your search keyword '"Re-encryption"' showing total 4 results

Search Constraints

Start Over You searched for: Descriptor "Re-encryption" Remove constraint Descriptor: "Re-encryption" Journal ieee access Remove constraint Journal: ieee access
4 results on '"Re-encryption"'

Search Results

1. Encryption and Re-Randomization Techniques for Malware Propagation

2. Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server

3. Encryption and Re-Randomization Techniques for Malware Propagation

4. Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server

Catalog

Books, media, physical & digital resources